|Army-Knife|[Metasploit](https://github.com/rapid7/metasploit-framework)|The world’s most used penetration testing framework||[`pentest`](/categorize/tags/pentest.md)|[](/categorize/langs/Ruby.md)|
|Army-knife|[Ronin](https://ronin-rb.dev)|Free and Open Source Ruby Toolkit for Security Research and Development||[`pentest`](/categorize/tags/pentest.md) [`crawl`](/categorize/tags/crawl.md) [`recon`](/categorize/tags/recon.md) [`exploit`](/categorize/tags/exploit.md)|[](/categorize/langs/Ruby.md)|
|Proxy|[EvilProxy](https://github.com/bbtfr/evil-proxy)|A ruby http/https proxy to do EVIL things.||[`mitmproxy`](/categorize/tags/mitmproxy.md)|[](/categorize/langs/Ruby.md)|
|Recon|[intrigue-core](https://github.com/intrigueio/intrigue-core)|Discover Your Attack Surface |||[](/categorize/langs/Ruby.md)|
|Recon|[Hunt3r](https://github.com/EasyRecon/Hunt3r)|Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework|||[](/categorize/langs/Ruby.md)|
|Scanner|[wpscan](https://github.com/wpscanteam/wpscan)|WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. |||[](/categorize/langs/Ruby.md)|
|Exploit|[XXEinjector](https://github.com/enjoiz/XXEinjector)|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.||[`xxe`](/categorize/tags/xxe.md)|[](/categorize/langs/Ruby.md)|
|Utils|[hbxss](https://github.com/hahwul/hbxss)|Security test tool for Blind XSS||[`xss`](/categorize/tags/xss.md) [`blind-xss`](/categorize/tags/blind-xss.md)|[](/categorize/langs/Ruby.md)|
|Utils|[oxml_xxe](https://github.com/BuffaloWill/oxml_xxe)|A tool for embedding XXE/XML exploits into different filetypes |||[](/categorize/langs/Ruby.md)|
|Env|[pentest-env](https://github.com/Sliim/pentest-env)|Pentest environment deployer (kali linux + targets) using vagrant and chef.||[`pentest`](/categorize/tags/pentest.md)|[](/categorize/langs/Ruby.md)|